Effects of a Honeypot on the Cyber Grand Challenge Final Event
Thompson, Michael F.
MetadataShow full item record
During the Cyber Grand Challenge Final Event, one team included a honeypot within most of their “patched” services, fooling some competitors into abandoning working proofs of vulnerabilities to instead attack the honeypot. However, logic within the patched service appears to have contained a flaw, which led to the service crashing.
Showing items related by title, author, creator and subject.
Lim, Sze Li Harry (Monterey, California. Naval Postgraduate School, 2006-12);A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. While the security community is reaping fruits of this collection tool, the hacker ...
Duong, Binh T. (Monterey, California. Naval Postgraduate School, 2006-03);Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyber-attacks and attacker behavior. When implemented as part of a security posture, honeypots also protect real networks by ...
McCaughey, Ryan J. (Monterey, California: Naval Postgraduate School, 2017-09);The number of devices vulnerable to unauthorized cyber access has been increasing at an alarming rate. A honeypot can deceive attackers trying to gain unauthorized access to a system; studying their interactions with ...